About cmcwplgnomg404

This author has not yet filled in any details.
So far cmcwplgnomg404 has created 117 blog entries.

QR Code Phishing Is Spreading Across Physical and Digital Channels

A look at how cybercriminals are turning QR codes into credential traps (qr code phishing)—and what businesses can do to reduce exposure.

A familiar tool is being weaponized

QR codes have become a routine part of daily business. They’re used for contactless check-ins, payment processing, document access, and marketing materials. But the convenience that makes QR codes so widely adopted also makes them exploitable.

Threat actors are now embedding malicious links in QR codes—both in emails and in physical materials like posters, mailers, and fake notices. The goal is simple: direct users to a spoofed login page that captures their credentials, often under the guise of document sharing, payment confirmation, or identity verification.

two people scanning qr codes for qr code phishing

What makes QR-based phishing effective

Unlike traditional phishing emails, QR code attacks don’t contain visible links or attachments. Users scan them with personal mobile devices, which often lack corporate security tools. This bypasses many of the protections in place on company-managed desktops and laptops.

Attackers rely on urgency, familiarity, and poor verification habits. A code may appear in a building lobby, a parking ticket, a service renewal notice, or even as a response to a job application. These tactics exploit environments where people are least likely to question what they’re scanning.

How businesses can reduce risk

Organizations should begin by educating staff on QR-related risks. Employees should be taught to avoid scanning codes from unfamiliar or unverified sources, especially those urging immediate action.

IT teams can take further steps by restricting access to personal devices on the corporate network and reviewing how QR codes are used in internal processes, signage, and customer-facing materials.

In environments with mobile device management (MDM), policies can be configured to scan or isolate web activity initiated from QR codes. For highly targeted industries—legal, healthcare, finance—physical security and visual signage policies should be reviewed, especially in shared or public-facing spaces.

The threat is low-tech in appearance but high-impact in execution. Training and operational vigilance are key.

Have questions? Contact us. We’re happy to help.

By Thomas McDonald
Vice President

2025-06-22T15:50:14-05:00May 26, 2025|

Infostealer Malware Is Fueling Business Email Compromise — Here’s What’s Changing

A closer look at how credential theft is reshaping BEC attacks and what businesses need to do now to stay ahead.

Attacks are no longer limited to spoofed emails

Business Email Compromise (BEC) used to rely on tricking users with fake invoice requests or urgent emails from impersonated executives. While those tactics still exist, the landscape is shifting.

Attackers are increasingly using infostealer malware—lightweight programs that quietly extract saved browser credentials, cookies, and tokens. Once installed, even briefly, these tools give attackers access to real email accounts, often without triggering alarms.

The result is a growing wave of BEC attacks that don’t spoof anyone—they use actual inboxes.

infostealer malware stealing data from businessman

What’s happening behind the scenes

Infostealer logs are bought and sold on dark web marketplaces. They include usernames, passwords, session cookies, and autofill data harvested from infected machines—often without detection. Once attackers gain access to a business email account, they monitor conversations, create hidden inbox rules, and impersonate internal stakeholders or vendors to redirect payments or initiate fraudulent transfers. These messages originate from real accounts, making them far harder to detect than traditional spoofing attempts.

Why this matters now

The surge in infostealer use has created a supply chain of compromise: initial infection, credential resale, and ultimately a targeted BEC attack. Many businesses discover the problem only after money is lost, a vendor relationship is damaged, or legal exposure surfaces.

Traditional email security filters don’t stop this. Once credentials are stolen, attackers bypass filtering entirely by logging in directly. While multifactor authentication (MFA) can help, inconsistent enforcement and token-based session hijacking can reduce its effectiveness.

What organizations should do next

Organizations should begin by enforcing MFA across all cloud platforms and user accounts. Endpoint tools should be in place to detect infostealer activity, such as unauthorized file access or suspicious outbound connections. It’s also important to review mailbox rules for any unexpected forwarding or folder manipulation, and to disable legacy protocols like IMAP and POP3, which are often exploited in these attacks.

Teams should also consider monitoring for dark web exposure or working with vendors who alert them when their credentials appear in breach data. The earlier a compromise is detected, the better the chances of avoiding a full-blown attack.

2025-06-22T16:04:22-05:00May 25, 2025|

Fake Login Pages Are Getting More Convincing: What You Should Know

A practical guide to how phishing websites impersonate Microsoft, Google, and other trusted brands—and how to spot them before it’s too late.

Imitation is the new strategy

Cybercriminals are no longer relying on poor grammar or broken links to trick users. Instead, they’re deploying highly accurate copies of login pages for Microsoft 365, Google Workspace, DocuSign, Dropbox, and financial institutions. These pages look real, respond quickly, and often use valid-looking URLs with minor visual differences.

Once a user enters their credentials, the information is sent directly to the attacker, who may immediately log in to the real account, set up forwarding rules, or change recovery settings.

a lady concerned over fake login pages

What makes these fake pages dangerous

These phishing sites often bypass traditional security awareness because they don’t rely on downloadable attachments or suspicious file names. Instead, they focus on psychological pressure—impersonating shared document requests, payment notices, or administrative alerts that demand quick action.

To make matters worse, attackers frequently use:

  • URL shorteners or redirect chains to hide the destination

  • HTTPS encryption (the lock icon) to create false trust

  • Real logos, fonts, and layout copied from the original service

  • Mobile-friendly designs to capture users on their phones

These tactics are effective because they’re designed to blend in, not raise alarms.

What you can do to protect yourself

While technical tools help, individual awareness remains essential. If you’re asked to log in to a familiar service, stop and consider:

  • Did you expect this message or file?

  • Is the sender’s email address spelled correctly and consistent with past communication?

  • Are you being asked to log in urgently, or with vague reasoning?

Before entering credentials, verify the site URL—character for character. Avoid clicking login links in emails when possible. Instead, navigate directly to the service through a bookmarked or manually typed URL.

Consider enabling multifactor authentication (MFA) on all accounts, which can prevent access even if a password is compromised.

2025-06-24T19:54:04-05:00May 25, 2025|

Actionable Threat Intelligence: What Businesses Should Focus on Right Now

A timely guide to the most pressing cyber threats and how to respond with clarity, speed, and operational readiness.

AI-driven deception is the new frontline

Cyber adversaries are now using generative AI to craft realistic phishing emails, deepfake videos, and voice-based social engineering scams. These tactics are designed to exploit trust and bypass traditional filters.

Businesses should implement advanced email threat protection that uses behavior-based detection, train staff to verify requests through secondary channels, and review voice authentication protocols for sensitive tasks.

a business leader being updated on actional threat intelligence

Infostealers are quietly stealing credentials

Malware strains like Lumma and RedLine are actively stealing browser-stored passwords, email logins, and financial credentials. These tools often remain undetected and are widely sold on underground markets.

Endpoint protection should be configured to detect command-and-control communication and data exfiltration patterns. Credential audits and forced password resets should be scheduled after any suspected compromise.

Ransomware is more targeted—and more public

Double extortion is now standard: threat actors encrypt data, then threaten to release it. This approach is increasingly used against professional services firms, healthcare providers, and mid-sized enterprises.

Organizations must maintain immutable backups, review which systems can communicate laterally across the network, and ensure response plans include legal, public relations, and client communication strategies.

Supply chain attacks remain a blind spot

Third-party vendors continue to be exploited as an entry point into larger organizations. Attackers compromise one supplier and move upstream, making vendor risk management a security priority.

Businesses should maintain inventories of all third-party access points, require vendors to meet minimum security standards, and segment supplier systems wherever possible.

By Thomas McDonald
Vice President

2025-06-22T16:18:19-05:00May 25, 2025|

How to Document Your Technology Environment (and Why It Matters)

A look at what IT documentation should include and how it supports support, compliance, and business continuity.

Unwritten knowledge creates risk

Many businesses operate with a limited understanding of their own IT environment. Systems are added over time, passwords are stored informally, and dependencies exist only in someone’s memory. When that person leaves—or a crisis occurs—reconstructing that knowledge becomes a costly exercise.

Documenting your IT environment reduces that risk. It turns unwritten knowledge into shared resources that support troubleshooting, planning, and incident response.

a woman documenting her IT environment

What effective documentation includes

Every organization’s environment is different, but most documentation should include:

  • Network diagrams showing devices, connections, and internet-facing systems

  • Server and workstation inventories with location, purpose, and update status

  • Application lists, license keys, and support contacts

  • Administrative credentials and access control logs (secured separately)

  • Backup schedules, retention policies, and restore procedures

  • Notes on vendor contracts, warranties, and renewal dates

These records should be centralized, regularly updated, and accessible to authorized personnel.

The benefits go beyond emergencies

Well-documented environments accelerate onboarding, simplify provider transitions, and support compliance reviews. They reduce reliance on individual memory and help IT teams respond faster when issues arise.

In regulated industries, documentation can serve as evidence of due diligence. It demonstrates that systems are known, monitored, and maintained—an expectation in many audit scenarios.

Ultimately, documentation isn’t about complexity. It’s about control.

2025-06-24T19:50:54-05:00May 25, 2025|
Go to Top